Chapter 6. Solutions in this chapter:

  • Understanding Network Encryption
  • Using OpenSSH to Encrypt Network Traffic Between Two Hosts
  • Installing OpenSSH
  • Configuring SSH
  • Implementing SSH to Secure Data
  • Distributing the Public Key
  • The SSH Client
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions

Introduction

In this chapter, you will learn about solutions to deploy strong encryption to enhance network security. Encryption ensures data confidentiality by using algorithms to encrypt data before it is sent over a network. The receiving host then decrypts the data to a readable format. The solutions in this chapter combine both authentication and encryption, and they include a step-by-step guide to implementing encryption over an insecure network ...

Get Next Generation SSH2 Implementation now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.